Platform: Code4rena
Start Date: 19/01/2024
Pot Size: $36,500 USDC
Total HM: 9
Participants: 113
Period: 3 days
Judge: 0xsomeone
Id: 322
League: ETH
Rank: 109/113
Findings: 1
Award: $0.06
🌟 Selected for report: 0
🚀 Solo Findings: 0
🌟 Selected for report: NPCsCorp
Also found by: 0x11singh99, 0xAadi, 0xBugSlayer, 0xE1, 0xPluto, 0xSimeon, 0xSmartContract, 0xabhay, 0xdice91, 0xprinc, Aamir, Aymen0909, CDSecurity, DadeKuma, DarkTower, EV_om, Eeyore, GeekyLumberjack, GhK3Ndf, Giorgio, Greed, Inference, JanuaryPersimmon2024, Kaysoft, Krace, Matue, MrPotatoMagic, NentoR, Nikki, PUSH0, Soliditors, Tendency, Tigerfrake, Timeless, Timenov, ZanyBonzy, ZdravkoHr, abiih, adeolu, al88nsk, azanux, bareli, boredpukar, cu5t0mpeo, d4r3d3v1l, darksnow, deth, dutra, ether_sky, haxatron, ke1caM, kodyvim, m4ttm, mgf15, mrudenko, nmirchev8, nobody2018, nuthan2x, peanuts, piyushshukla, ravikiranweb3, rouhsamad, seraviz, simplor, slylandro_star, stealth, th13vn, vnavascues, wangxx2026, zaevlad
0.0586 USDC - $0.06
The setRouter function is missing the onlyOwner
access control modifier, and a malicious router can be assigned as the main router in the DcntEth contract.
Functions like:
function mint(address _to, uint256 _amount) public onlyRouter { _mint(_to, _amount); }
function burn(address _from, uint256 _amount) public onlyRouter { _burn(_from, _amount); }
function setRouter(address _router) public { router = _router; }
Manual code review.
Append the onlyOwner modifier to the setRouter function.
Access Control
#0 - c4-pre-sort
2024-01-25T00:04:44Z
raymondfam marked the issue as sufficient quality report
#1 - c4-pre-sort
2024-01-25T00:04:50Z
raymondfam marked the issue as duplicate of #14
#2 - alex-ppg
2024-02-03T13:13:17Z
Insufficient substantiation of the actual vulnerability (minting of tokens) and overall poor quality.
#3 - c4-judge
2024-02-03T13:13:23Z
alex-ppg marked the issue as partial-50